Cargando…

Advanced persistent threat : understanding the danger and how to protect your organization /

The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization's current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the in...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Cole, Eric
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boston : Syngress, ©2013.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000Ma 4500
001 OR_ocn823729494
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 121129s2013 mau o 001 0 eng d
040 |a E7B  |b eng  |e pn  |c E7B  |d OCLCQ  |d OCLCO  |d B24X7  |d UMI  |d COO  |d YDXCP  |d DEBSZ  |d DKDLA  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCF  |d OCLCO  |d OCLCQ  |d OCLCO  |d Z5A  |d LIV  |d OCLCQ  |d CEF  |d NLE  |d UKMGB  |d UAB  |d AU@  |d UKAHL  |d OCLCO  |d OCLCQ  |d OCLCO 
015 |a GBB6G6239  |2 bnb 
016 7 |a 018082659  |2 Uk 
019 |a 842430712 
020 |a 1597499552 
020 |a 9781597499552 
020 |z 9781597499491 
020 |z 9781597499552 
020 |z 1597499498 
029 1 |a AU@  |b 000051433072 
029 1 |a DEBBG  |b BV041121666 
029 1 |a DEBSZ  |b 396765866 
029 1 |a NZ1  |b 14838624 
029 1 |a UKMGB  |b 018082659 
029 1 |a AU@  |b 000058968512 
035 |a (OCoLC)823729494  |z (OCoLC)842430712 
037 |a CL0500000215  |b Safari Books Online 
050 4 |a TK5105.59  |b .C65 2013eb 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Cole, Eric. 
245 1 0 |a Advanced persistent threat :  |b understanding the danger and how to protect your organization /  |c Eric Cole. 
260 |a Boston :  |b Syngress,  |c ©2013. 
300 |a 1 online resource (xvi, 290 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
505 0 |a The changing threat -- Why are organizations being compromised? -- How are organizations being compromised? -- Risk based approach to security -- Protecting your data -- Prevention is ideal but detection is a must -- Incident response: respond and recover -- Technologies for success -- The changing landscape: cloud and mobilization -- Proactive security and reputational ranking -- Focusing in on the right security -- Implementing adaptive security. 
520 8 |a The newest threat to security has been categorized as the Advanced Persistent Threat or APT. The APT bypasses most of an organization's current security devices, and is typically carried out by an organized group, such as a foreign nation state or rogue group with both the capability and the intent to persistently and effectively target a specific entity and wreak havoc. Most organizations do not understand how to deal with it and what is needed to protect their network from compromise. In "Advanced Persistent Threat: Understanding the Danger and How to Protect your Organization", Eric Cole discusses the critical information that readers need to know about APT and how to avoid being a victim. "Advanced Persistent Threat" is the first comprehensive manual that discusses how attackers are breaking into systems and what to do to protect and defend against these intrusions. "Advanced Persistent Threat" covers what you need to know including: How and why organizations are being attacked; how to develop a "Risk based Approach to Security"; tools for protecting data and preventing attacks; critical information on how to respond and recover from an intrusion; and the emerging threat to Cloud based networks. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Computer networks  |x Access control. 
650 0 |a Internet  |x Security measures. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Internet  |x Sécurité  |x Mesures. 
650 7 |a Computer networks  |x Access control  |2 fast 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Internet  |x Security measures  |2 fast 
776 0 8 |i Print version:  |a Cole, Eric.  |t Advanced persistent threat.  |d Waltham, Mass. :  |b Syngress,  |c [2013]  |z 9781597499491  |w (DLC) 2012043183  |w (OCoLC)793581662 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781597499491/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH24673643 
938 |a Books 24x7  |b B247  |n bks00051023 
938 |a ebrary  |b EBRY  |n ebr10626274 
938 |a YBP Library Services  |b YANK  |n 9918666 
994 |a 92  |b IZTAP